A vulnerability has been reported in EMC NetWorker, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the Networker Remote Exec Service (nsrexecd.exe). This can be exploited to cause a stack-based buffer overflow by sending a poll or kill request with an overly long, invalid subcmd to the service, which is available via a query to the portmapper on port 111/TCP for service #0x5f3e1, version 1.
Successful exploitation allows execution of arbitrary code.
The vulnerability is reported in version 7.x.x.
Solution: The vendor has issued updates to correct this vulnerability. For more information see knowledge base article esg83899 (registration required) or contact the EMC Software Technical Support.
Provided and/or discovered by: Tenable Network Security, reported via ZDI.
Original Advisory: http://www.zerodayinitiative.com/advisories/ZDI-07-049.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: EMC NetWorker Remote Exec Service Buffer Overflow
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.